Sciweavers

612 search results - page 97 / 123
» Hardness assumptions in the foundations of theoretical compu...
Sort
View
ICS
2005
Tsinghua U.
14 years 1 months ago
Tasking with out-of-order spawn in TLS chip multiprocessors: microarchitecture and compilation
Chip Multiprocessors (CMPs) are flexible, high-frequency platforms on which to support Thread-Level Speculation (TLS). However, for TLS to deliver on its promise, CMPs must explo...
Jose Renau, James Tuck, Wei Liu, Luis Ceze, Karin ...
MOBICOM
2005
ACM
14 years 1 months ago
Barrier coverage with wireless sensors
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Santosh Kumar, Ten-Hwang Lai, Anish Arora
SAC
2011
ACM
12 years 10 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
SIGSOFT
2012
ACM
12 years 3 months ago
Report from the 2nd international workshop on replication in empirical software engineering research (RESER 2011)
The RESER workshop provides a venue in which empirical software engineering researchers can discuss the theoretical foundations and methods of replication, as well as present the ...
Jonathan L. Krein, Charles D. Knutson, Lutz Preche...
WS
2003
ACM
14 years 29 days ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas